|
Message-ID: <007b0fc2-2d8b-e42d-5fbb-b62e18b84255@apache.org> Date: Mon, 01 Jul 2024 12:41:40 +0000 From: Eric Covener <covener@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-38474: Apache HTTP Server weakness with encoded question marks in backreferences Severity: important Affected versions: - Apache HTTP Server 2.4.0 through 2.4.59 Description: Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified. Credit: Orange Tsai (@orange_8361) from DEVCORE (finder) References: https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-38474 Timeline: 2024-04-01: reported
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.